Abstract is missing.
- Mechanism design for robust resource management to false report in cloud computing systemsYusuke Aoki, Takafumi Kanazawa, Toshimitsu Ushio. 1-8 [doi]
- An inverse correlated equilibrium framework for utility learning in multiplayer, noncooperative settingsAaron Bestick, Lillian J. Ratliff, Posu Yan, Ruzena Bajcsy, S. Shankar Sastry. 9-16 [doi]
- Future cars: necessity for an adaptive and distributed multiple independent levels of security architectureAlexander Georg Camek, Christian Buckl, Alois Knoll. 17-24 [doi]
- A framework for privacy and security analysis of probe-based traffic information systemsEdward S. Canepa, Christian G. Claudel. 25-32 [doi]
- Bio-inspired strategy for control of viral spreading in networksChinwendu Enyioha, Victor M. Preciado, George J. Pappas. 33-40 [doi]
- Using channel state feedback to achieve resilience to deep fades in wireless networked control systemsBin Hu, Michael D. Lemmon. 41-48 [doi]
- Privacy-preserving release of aggregate dynamic modelsJerome Le Ny, George J. Pappas. 49-56 [doi]
- Algorithms for determining network robustnessHeath LeBlanc, Xenofon D. Koutsoukos. 57-64 [doi]
- S3A: secure system simplex architecture for enhanced security and robustness of cyber-physical systemsSibin Mohan, Stanley Bak, Emiliano Betti, Heechul Yun, Lui Sha, Marco Caccamo. 65-74 [doi]
- Towards synthesis of platform-aware attack-resilient control systems: extended abstractMiroslav Pajic, Nicola Bezzo, James Weimer, Rajeev Alur, Rahul Mangharam, Nathan Michael, George J. Pappas, Oleg Sokolsky, Paulo Tabuada, Stephanie Weirich, Insup Lee. 75-76 [doi]
- Verifying information flow properties of hybrid systemsPavithra Prabhakar, Boris Köpf. 77-84 [doi]
- Achieving resilience of heterogeneous networks through predictive, formal analysisZhijing Qin, Grit Denker, Carolyn L. Talcott, Nalini Venkatasubramanian. 85-92 [doi]
- Minimax control for cyber-physical systems under network packet scheduling attacksYasser Shoukry, José Araujo, Paulo Tabuada, Mani B. Srivastava, Karl Henrik Johansson. 93-100 [doi]
- Verifiably-safe software-defined networks for CPSRichard William Skowyra, Andrei Lapets, Azer Bestavros, Assaf J. Kfoury. 101-110 [doi]
- Bounding the smallest robustly control invariant sets in networks with discrete disturbances and controlsDanielle C. Tarraf. 111-116 [doi]
- Contract-based blame assignment by trace analysisShaohui Wang, Anaheed Ayoub, Radoslav Ivanov, Oleg Sokolsky, Insup Lee. 117-126 [doi]
- Distributed model-invariant detection of unknown inputs in networked systemsJames Weimer, Damiano Varagnolo, Karl Henrik Johansson. 127-134 [doi]
- Taxonomy for description of cross-domain attacks on CPSMark Yampolskiy, Péter Horváth, Xenofon D. Koutsoukos, Yuan Xue, Janos Sztipanovits. 135-142 [doi]